nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adjusted probabilistic route discovery in mobile ad hoc networks
|
Abdulai, Jamal-Deen |
|
2009 |
35 |
1 |
p. 168-182 15 p. |
artikel |
2 |
An area/performance trade-off analysis of a GF(2 m ) multiplier architecture for elliptic curve cryptography
|
Morales-Sandoval, Miguel |
|
2009 |
35 |
1 |
p. 54-58 5 p. |
artikel |
3 |
An efficient cryptosystem Delta for stream cipher applications
|
Kanso, Ali A. |
|
2009 |
35 |
1 |
p. 126-140 15 p. |
artikel |
4 |
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
|
Kang, Baoyuan |
|
2009 |
35 |
1 |
p. 9-17 9 p. |
artikel |
5 |
A secure identity-based multi-proxy signature scheme
|
Cao, Feng |
|
2009 |
35 |
1 |
p. 86-95 10 p. |
artikel |
6 |
A self-verification authentication mechanism for mobile satellite communication systems
|
Chen, Tzung-Her |
|
2009 |
35 |
1 |
p. 41-48 8 p. |
artikel |
7 |
A versatile Montgomery multiplier architecture with characteristic three support
|
Öztürk, E. |
|
2009 |
35 |
1 |
p. 71-85 15 p. |
artikel |
8 |
Dynamic and efficient joint encryption scheme in the plain public key model
|
Shao, Zuhua |
|
2009 |
35 |
1 |
p. 189-196 8 p. |
artikel |
9 |
Dynamic queue level control of TCP/RED systems in AQM routers
|
Zhang, Wei |
|
2009 |
35 |
1 |
p. 59-70 12 p. |
artikel |
10 |
Editorial Board
|
|
|
2009 |
35 |
1 |
p. IFC- 1 p. |
artikel |
11 |
Enhanced AODV routing protocol for Bluetooth scatternet
|
Al-Jarrah, Omar |
|
2009 |
35 |
1 |
p. 197-208 12 p. |
artikel |
12 |
Enhanced password-based simple three-party key exchange protocol
|
Kim, Hyun-Seok |
|
2009 |
35 |
1 |
p. 107-114 8 p. |
artikel |
13 |
Fast edge integration based active contours for color images
|
Zheng, Ying |
|
2009 |
35 |
1 |
p. 141-149 9 p. |
artikel |
14 |
Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channels
|
Sener, Seher |
|
2009 |
35 |
1 |
p. 1-8 8 p. |
artikel |
15 |
Identity-based strong designated verifier signature schemes: Attacks and new construction
|
Kang, Baoyuan |
|
2009 |
35 |
1 |
p. 49-53 5 p. |
artikel |
16 |
2008 List of Referees
|
|
|
2009 |
35 |
1 |
p. 227-230 4 p. |
artikel |
17 |
More efficient systolic arrays for multiplication in GF( 2 m ) using LSB first algorithm with irreducible polynomials and trinomials
|
Kwon, Soonhak |
|
2009 |
35 |
1 |
p. 159-167 9 p. |
artikel |
18 |
Multichannel direct sequence spectrum signaling using code phase shift keying
|
Sahu, P.P. |
|
2009 |
35 |
1 |
p. 218-226 9 p. |
artikel |
19 |
Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users
|
Jamshidi, Azizollah |
|
2009 |
35 |
1 |
p. 96-106 11 p. |
artikel |
20 |
New left-to-right minimal weight signed-digit radix-r representation
|
Qin, Baodong |
|
2009 |
35 |
1 |
p. 150-158 9 p. |
artikel |
21 |
Performance of commercial multimedia workloads on the Intel Pentium 4: A case study
|
Martinez, Christopher |
|
2009 |
35 |
1 |
p. 18-32 15 p. |
artikel |
22 |
Robust watermarking based on DWT and nonnegative matrix factorization
|
Lu, Wei |
|
2009 |
35 |
1 |
p. 183-188 6 p. |
artikel |
23 |
Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses
|
Topal, Cihan |
|
2009 |
35 |
1 |
p. 115-125 11 p. |
artikel |
24 |
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
|
Juang, Wen-Shenq |
|
2009 |
35 |
1 |
p. 33-40 8 p. |
artikel |
25 |
Undecimated double density wavelet transform based speckle reduction in SAR images
|
Gnanadurai, D. |
|
2009 |
35 |
1 |
p. 209-217 9 p. |
artikel |